cheeseman222
In Runtime
- Messages
- 200
This is the second part, the first part a bit farther down the list. Remember i didn't write these, some guy named Wang did.
Topics Covered in Chapter 2
What are Wingates?
Where do I find out the addresses of Wingates?
What are Proxys?
What are Firewalls?
How do I forge email?
What are Email headers?
What does the stuff in an Email header mean?
What is IRC?
How can I hack Ops on an IRC channel?
How can I change my Windows boot-up/turn-off screens?
How can I break into a windows 9x system?
--------------------------------------------------------------------------------
What are Wingates?
A wingate is a windows-based computer that can be used as a gateway to other computers. It is running the software 'Wingate'. The idea is that you would install it on a LAN (Local Area Network) and then it would allow the people on the LAN to connect to the internet under the wingate computers modem. However, if the person who setup the wingate is stupid (which most of them are) they will leave it improperly configured. This means that not just people who are on the LAN have access to it, everyone on the Internet has access!
Wingates are kind of like divertions that you can take when connecting to servers (Do I explain this well or what?). Here is an example (using Telnet):
If I want to connect to "Phreak.org" on port "25", I could simply load telnet up, tell it to connect - and Bingo I'm connected. But how anonymous is that? The chances are that when I connect to that server it logs my IP address along with the time I connected and the date. If I do anything bad, they can contact my Internet Service Provider and get me flung off.
So, what your probably saying is, "Ok, so is there anyway I can fake my IP address so that they cant find out who I am?". Well, that's where the Wingates come in. Lets try connecting to Phreak.org again this time through a Wingate:
I load up telnet, and instead of connecting straight to phreak.org - I connect to the wingate, say, Wingate.com on port 23 (port 23 is the usual port Wingates operate on) and it gives me the prompt "Wingate>". I then type in "Phreak.org 25" and the wingate sends me to Phreak.org on port 25. The difference is - I am connecting under the wingates IP address, and not my own!
This isn't foolproof though, so don't go around thinking your untraceable - if someone really wanted to find out who you were, chances are they could. However, saying this, most Wingates have little no logging - which means that they dont keep tracks of who goes through them...so you might just get away with your haxor escapades.
--------------------------------------------------------------------------------
Where do I find out the addresses of Wingates?
Well, this is slightly more tricky because Wingates go up and down all the time. A wingate scanner is available from my website as part of the WangScript WarTools ( http://come.to/wangscript ) so you can download that. Basically that scans a range of IP address and tells you if it finds any wingates.
The second method (far easier) is to connect to some big IRC network (eg. eu.undernet.org or Irc.dal.net) and type the command "/stats k". This will give you a list of all the people banned from the server and their addresses. Chances are most of them have been banned for using Wingates! So, just copy down their addresses and then try telneting to them on port 23. If it responds "Wingate>" - you got one!
--------------------------------------------------------------------------------
What are proxies?
Proxy servers can handle HTTP, FTP and GOPHER. Each have their own ports. A proxy is made up of a server-name and what port it is on.
Example: proxy.foobar.net:80.
Server address/name: proxy.foobar.net
Port: 80
Say you want to be a bit more anonymous by hiding your IP, one solution would be to use a proxy. If someone tracked the proxy it would give them the location of that server, and not you! So I suppose you could say a proxy achieves the same thing as a wingate. You can use proxies with Netscape, Internet Explorer, and mIRC to anonomize your online time.
--------------------------------------------------------------------------------
What are firewalls?
A firewall is a system (or group of systems) that controls access between two networks. They can exist to block incoming traffic / to permit incoming traffic.
--------------------------------------------------------------------------------
How do I forge email?
Telnet to a mail server on port 25 (usually you can just get an ISP, e.g. BTInternet and then add mail.btinternet.com). Now, different servers will run different mailing programs - that is expected...but when you connect to a mail server the most likely mail program you are likely to encounter is SendMail (a program which is known for glitches and flaws). How do you know if its SendMail? When you telnet to the mail server it might mention 'Sendmail' or there may be some numbers like '8.8.3/8.6.9' that is a pretty good sign that it is running sendmail. Once connected to the mail server, if it is sendmail - type in the following (may be different on some versions):
Helo <A fake hostname>
Mail from: <The address you want to make it look like it has come from>
Rcpt to: <The recipient>
Data
<You message to the recipient>
. (just a single dot)
If it isn't SendMail then the syntax will be slightly different, but along the same lines. Here is an example of what you might type:
helo aol.com
mailfrom: youaredodgy@hacker.com
rcpt to: billclinton@whitehouse.gov
data
I know what your up to you dirty old man
.
So is that completely untraceable? Well, No. The average internet user will wet their pants if you forge an email to them from their own address with the message "I will become you!"...and they wont have a clue how to trace it. But anyone with any skill will know exactly how to find out where it came from. They can do this by reading the email headers. Headers are the extra bits that come with an email that you can't by default see (although there will be an option in your email program to switch "Show All Headers" on or "View Source of Email"). The thing is, when you send an email your IP address gets attatched to it (Damn that IP address thing again!). Send a fake mail to yourself and see if you can find your email address in the headers.
--------------------------------------------------------------------------------
What are Email headers?
Headers are the extra bits that come with an email that you can't by default see (although there will be an option in your email program to switch "Show All Headers" on or "View Source of Email"). Here is an example of an email (all the real server names has been removed and replaced by Fakes):
Return-Path: <wang@fubar.org>
Received: from fubar.org ([57.11.151.287]) by mta2-svc.dodgy.net
(InterMail v4.01.01.02 201-229-111-106) with SMTP
id <19990730093810.ECQX20505.mta2-svc@fubar.org>
for <Git@dodgy.net>; Fri, 30 Jul 1999 10:38:10 +0100
Received: med fubar.org via smail vid stdio
Date: Fri, 30 Jul 1999 04:42:37 -0500 (CDT)
From: Wang <wang@fubar.org>
To: Git@dodgy.net
Subject: Wang is here
Message-ID: <Pine.LNX.4.10.9907300442090.28581-100000@fubar.org>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-Mozilla-Status: 8001
Topics Covered in Chapter 2
What are Wingates?
Where do I find out the addresses of Wingates?
What are Proxys?
What are Firewalls?
How do I forge email?
What are Email headers?
What does the stuff in an Email header mean?
What is IRC?
How can I hack Ops on an IRC channel?
How can I change my Windows boot-up/turn-off screens?
How can I break into a windows 9x system?
--------------------------------------------------------------------------------
What are Wingates?
A wingate is a windows-based computer that can be used as a gateway to other computers. It is running the software 'Wingate'. The idea is that you would install it on a LAN (Local Area Network) and then it would allow the people on the LAN to connect to the internet under the wingate computers modem. However, if the person who setup the wingate is stupid (which most of them are) they will leave it improperly configured. This means that not just people who are on the LAN have access to it, everyone on the Internet has access!
Wingates are kind of like divertions that you can take when connecting to servers (Do I explain this well or what?). Here is an example (using Telnet):
If I want to connect to "Phreak.org" on port "25", I could simply load telnet up, tell it to connect - and Bingo I'm connected. But how anonymous is that? The chances are that when I connect to that server it logs my IP address along with the time I connected and the date. If I do anything bad, they can contact my Internet Service Provider and get me flung off.
So, what your probably saying is, "Ok, so is there anyway I can fake my IP address so that they cant find out who I am?". Well, that's where the Wingates come in. Lets try connecting to Phreak.org again this time through a Wingate:
I load up telnet, and instead of connecting straight to phreak.org - I connect to the wingate, say, Wingate.com on port 23 (port 23 is the usual port Wingates operate on) and it gives me the prompt "Wingate>". I then type in "Phreak.org 25" and the wingate sends me to Phreak.org on port 25. The difference is - I am connecting under the wingates IP address, and not my own!
This isn't foolproof though, so don't go around thinking your untraceable - if someone really wanted to find out who you were, chances are they could. However, saying this, most Wingates have little no logging - which means that they dont keep tracks of who goes through them...so you might just get away with your haxor escapades.
--------------------------------------------------------------------------------
Where do I find out the addresses of Wingates?
Well, this is slightly more tricky because Wingates go up and down all the time. A wingate scanner is available from my website as part of the WangScript WarTools ( http://come.to/wangscript ) so you can download that. Basically that scans a range of IP address and tells you if it finds any wingates.
The second method (far easier) is to connect to some big IRC network (eg. eu.undernet.org or Irc.dal.net) and type the command "/stats k". This will give you a list of all the people banned from the server and their addresses. Chances are most of them have been banned for using Wingates! So, just copy down their addresses and then try telneting to them on port 23. If it responds "Wingate>" - you got one!
--------------------------------------------------------------------------------
What are proxies?
Proxy servers can handle HTTP, FTP and GOPHER. Each have their own ports. A proxy is made up of a server-name and what port it is on.
Example: proxy.foobar.net:80.
Server address/name: proxy.foobar.net
Port: 80
Say you want to be a bit more anonymous by hiding your IP, one solution would be to use a proxy. If someone tracked the proxy it would give them the location of that server, and not you! So I suppose you could say a proxy achieves the same thing as a wingate. You can use proxies with Netscape, Internet Explorer, and mIRC to anonomize your online time.
--------------------------------------------------------------------------------
What are firewalls?
A firewall is a system (or group of systems) that controls access between two networks. They can exist to block incoming traffic / to permit incoming traffic.
--------------------------------------------------------------------------------
How do I forge email?
Telnet to a mail server on port 25 (usually you can just get an ISP, e.g. BTInternet and then add mail.btinternet.com). Now, different servers will run different mailing programs - that is expected...but when you connect to a mail server the most likely mail program you are likely to encounter is SendMail (a program which is known for glitches and flaws). How do you know if its SendMail? When you telnet to the mail server it might mention 'Sendmail' or there may be some numbers like '8.8.3/8.6.9' that is a pretty good sign that it is running sendmail. Once connected to the mail server, if it is sendmail - type in the following (may be different on some versions):
Helo <A fake hostname>
Mail from: <The address you want to make it look like it has come from>
Rcpt to: <The recipient>
Data
<You message to the recipient>
. (just a single dot)
If it isn't SendMail then the syntax will be slightly different, but along the same lines. Here is an example of what you might type:
helo aol.com
mailfrom: youaredodgy@hacker.com
rcpt to: billclinton@whitehouse.gov
data
I know what your up to you dirty old man
.
So is that completely untraceable? Well, No. The average internet user will wet their pants if you forge an email to them from their own address with the message "I will become you!"...and they wont have a clue how to trace it. But anyone with any skill will know exactly how to find out where it came from. They can do this by reading the email headers. Headers are the extra bits that come with an email that you can't by default see (although there will be an option in your email program to switch "Show All Headers" on or "View Source of Email"). The thing is, when you send an email your IP address gets attatched to it (Damn that IP address thing again!). Send a fake mail to yourself and see if you can find your email address in the headers.
--------------------------------------------------------------------------------
What are Email headers?
Headers are the extra bits that come with an email that you can't by default see (although there will be an option in your email program to switch "Show All Headers" on or "View Source of Email"). Here is an example of an email (all the real server names has been removed and replaced by Fakes):
Return-Path: <wang@fubar.org>
Received: from fubar.org ([57.11.151.287]) by mta2-svc.dodgy.net
(InterMail v4.01.01.02 201-229-111-106) with SMTP
id <19990730093810.ECQX20505.mta2-svc@fubar.org>
for <Git@dodgy.net>; Fri, 30 Jul 1999 10:38:10 +0100
Received: med fubar.org via smail vid stdio
Date: Fri, 30 Jul 1999 04:42:37 -0500 (CDT)
From: Wang <wang@fubar.org>
To: Git@dodgy.net
Subject: Wang is here
Message-ID: <Pine.LNX.4.10.9907300442090.28581-100000@fubar.org>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-Mozilla-Status: 8001